This message was sent to ##Email##
|
February 23, 2016 |
| | | |
|
|
By Felix P. Nater, IAPSC member
On January 19, 2016, I represented the IAPSC at the ASIS/NFPA Active Shooter Stakeholder Meeting at the Ritz Pentagon, Arlington, VA. The purpose of the meeting was to discuss the need for active shooter protocols and identify next steps. There were approximately 100 attendees from various private, public, and law enforcement organizations around the United States and Canada. It was not clear if there were any attendees outside the U.S. The group was broken down into 5 subgroups to discuss management concerns and operational measures in avoiding, responding to and recovering from an active shooter incident as well as identify next steps. A significant value to be derived from the NFPA collaboration is the potential production of a compatible joint operational document.
READ MORE
IAPSC
Security here at home and beyond our borders was, is, and will always be a main concern for most of our clients, but it has been an especially prevalent discussion topic in recent months. How will security consultants ready themselves to meet their client needs and demands in our changing security landscape? The 2016 IAPSC Annual Conference program content is focused on helping the security professional stay at the forefront of client concerns. From counter-terrorism to cyber security, you'll learn techniques and understand new ways to take your business to the next level, at home and abroad. Join us on April 17-20, 2016 at the Mills House in downtown Charleston, South Carolina.
View the conference program and session topics.
IAPSC
Join IAPSC and local Charleston leaders for these exciting discussions during the 2016 Annual Conference! For those who can’t attend the full conference, individual registration is available for these sessions.
Forensic Workshop
Monday, April 18 • 4:15 p.m.
Join us for this comprehensive analysis from one of the nation's leading crime victim lawyer of negligent security cases in the 21st Century: Michael Haggard, The Haggard Law Group. This will be a highly interactive and demonstrative presentation highlighting "Actual Cases" that have resulted in some of the highest verdicts and settlements in the United States regarding negligent security cases.
Faith-Based & Community Security Breakfast Roundtable
Wednesday, April 20 • 8 a.m.
Participants are invited to join their colleagues and local Charleston leadership for an open forum discussion on community security, risk assessment, and management.
Learn more and register today!
IAPSC
Join us for the IAPSC "Successful Security Consulting" Workshop on Tuesday, April 5, 2016, 8:30 a.m.-5 p.m. at Sans Expo Las Vegas. This popular, one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program. IAPSC Education Chair Frank Pisciotta is managing the program with the following presenters: David Aggleton, Harold Gillens, Ken Wheatley, and John White.
View the SSC program outline and register now.
IAPSC
On behalf of ISC and SIA, we'd like to invite you to join us at ISC West 2016 at the Sands Expo in Las Vegas. ISC West is the leading physical security event to unite the entire security channel, from dealers, installers, integrators, specifiers, consultants and end-users of physical, network and IT products. The Exhibit Hall will be open April 6-8 and SIA Educational sessions will be April 5-7. IAPSC Members: Contact us for FREE exhibit hall registration.
IAPSC
The Interest Groups facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members to survey the needs of the membership in their specialized areas and discuss current topics, best practices and guidelines, challenges members are experiencing, and trends in the industry. These groups may also be a forum for collaborating on working group projects, seminars, and networking activities. It's easy to participate in the monthly teleconference from your computer or your phone, via GoToMeeting.
We hope to connect with you at an upcoming Interest Group session:
March 18 @ 9 a.m. PDT — Security Design & Engineering
April 15 @ 9 a.m. PDT — Cybersecurity.
May 20 @ 9 a.m. PDT — Forensics and Security Management.
Sign up now by contacting iapsc@iapsc.org
GovTech
A new study out of George Washington University took a look at Twitter’s ongoing efforts to remove terrorist sympathizers from the platform and found that the tactic had a substantial effect.
According the report, announced Feb. 18 by the Program on Extremism, the social media platform's consistent suspension of English-speaking, Islamic State-sympathetic accounts between August and September of 2015 resulted in substantial disruption to the number of followers per account.
READ MORE
Los Angeles Times
A court order requiring Apple to create a way to help law enforcement get access to a terrorist's smartphone amounts to an "unprecedented" stretch of an antiquated law — one that is likely to spark an epic fight pitting privacy against national security, legal scholars said. Typically, law enforcement has filed for warrants under seal, and courts have issued orders under seal, to protect the confidentiality of ongoing criminal investigations.
READ MORE
SecurityInfoWatch
Despite the fact that four months have passed since the EMV (EuroPay, MasterCard and Visa) liability shift officially took effect in the U.S., only a small percentage of retailers are actually in compliance with the standard, which requires merchants to implement chip-enabled payment card terminals in their stores or risk being liable for fraudulent purchases.
READ MORE
Tech Insider
A surprising number of the people working to keep their company networks safe from hackers have actually broken into their company or other organization's systems themselves, according to a new report from Absolute Software Corporation. The information security firm polled more than 500 information technology leaders at mid-size and larger U.S. companies, with one-third admitting they had "successfully hacked their own or another organization."
READ MORE
Security Intelligence
Despite the frequent travel, one of the most rewarding aspects of my job is working with chief information security officers across multiple industries battling the multitudes of cyberattacks they face. These near-daily insights are fascinating and help me focus on what IBM Security can do to stem the tide against cybercriminals and help organizations protect their network environments.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|